Question No: 121 – (Topic 2)

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

The we-are-secure.com server is using honeypot.

The we-are-secure.com server is using a TCP wrapper.

The telnet service of we-are-secure.com has corrupted.

The telnet session is being affected by the stateful inspection firewall.

Answer: B

Question No: 122 – (Topic 2)

You want to find out what ports a system is listening on. What Is the correct command on a Linux system?

Question No: 123 – (Topic 2)

Question No: 124 – (Topic 2)

Which of the following is the most common method for an attacker to spoof email?

Back door

Replay attack

Man in the middle attack

Open relay

Answer: D

Question No: 125 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Checkpoint files

cookie files

Temporary files

EDB and STM database files

Answer: A,C,D

Question No: 126 – (Topic 2)

Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?

NetStumbler

Tcpdump

Kismet

Ettercap

Answer: A

Question No: 127 – (Topic 2)

You are sending a file to an FTP server. The file will be broken into several pieces of information packets (segments) and will be sent to the server. The file will again be reassembled and reconstructed once the packets reach the FTP server. Which of the following information should be used to maintain the correct order of information packets during the reconstruction of the file?

Acknowledge number

TTL

Checksum

Sequence number

Answer: D

Question No: 128 – (Topic 2)

Which of the following attacks can be overcome by applying cryptography?

Buffer overflow

Web ripping

DoS

Sniffing

Answer: D

Question No: 129 – (Topic 2)

Which of the following tools can be used to perform Windows password cracking, Windows enumeration, and VoIP session sniffing?

Cain

L0phtcrack

Pass-the-hash toolkit

John the Ripper

Answer: A

Question No: 130 – (Topic 2)

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?